Abstract
AEGIS, a dedicated authenticated encryption algorithm is one of the winners of the CAESAR portfolio. In literature, there exist fault attacks on AEGIS family of ciphers. Fault attack is one of the most efficient forms of side-channel attacks against implementations of cryptographic algorithms, and the protection against fault attack is vital for security-related devices. In this paper, we propose countermeasures for AEGIS family of ciphers. The proposed countermeasures show that the state of the ciphers can not be recovered faster than exhaustive search because it needs \(2^{128}\) time to recover a state of each cipher.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) (2013). http://competitions.cr.yp.to/caesar.html
Wu H, Preneel B (2013) AEGIS: a fast authenticated encryption algorithm. In: Selected areas in cryptography—SAC 2013—20th international conference. Burnaby, BC, Canada, Revised Selected Papers. pp 185–201. https://doi.org/10.1007/978-3-662-43414-7_10
Daemen J, Rijmen V (2002) The design of rijndael: AES—the advanced encryption standard. Information security and cryptography. Springer, Berlin. https://doi.org/10.1007/978-3-662-04722-4
Salam MI, Simpson L, Bartlett H, Dawson E, Wong KK (2018) Fault attacks on the authenticated encryption stream cipher MORUS. Cryptography 2(1):4. https://doi.org/10.3390/cryptography2010004
Zhang X, Feng X, Lin D (2017) Fault attack on ACORN v3. IACR Cryptol ePrint Arch 855. http://eprint.iacr.org/2017/855
Adomnicai A, Fournier JJA, Masson L (2018) Masking the lightweight authenticated ciphers ACORN and Ascon in software. IACR Cryptol ePrint Arch 708 (2018). https://eprint.iacr.org/2018/708
Dey P, Rohit RS, Sarkar S, Adhikari A (2016) Differential fault analysis on tiaoxin and AEGIS family of ciphers. In: Security in computing and communications—4th international symposium, SSCC. Jaipur, India, Proceedings, pp 74–86. https://doi.org/10.1007/978-981-10-2738-3_7
El-Hadary, A., Megahed, M., ElAzeem, M.: A proposed solutions to two possible attacks over AEGIS authenticated encryption algorithm. International Journal of Computer Theory and Engineering 10, 185–189 (01 2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Maiti, S., Roy Chowdhury, D. (2021). Preventing Differential Fault Analysis Attack on AEGIS Family of Ciphers. In: Giri, D., Buyya, R., Ponnusamy, S., De, D., Adamatzky, A., Abawajy, J.H. (eds) Proceedings of the Sixth International Conference on Mathematics and Computing. Advances in Intelligent Systems and Computing, vol 1262. Springer, Singapore. https://doi.org/10.1007/978-981-15-8061-1_1
Download citation
DOI: https://doi.org/10.1007/978-981-15-8061-1_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8060-4
Online ISBN: 978-981-15-8061-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)